Perhaps the biggest security bug of this generation, Heartbleed offers a number of lessons for improving incident response. Threat expert Nick Lewis highlights his key takeaways.
This seven-question quiz will test you on the key points we've covered in the malicious mobile apps Security School by Mike Cobb.
Preview: At Black Hat USA, experts will detail the steps taken by the security community and law enforcement to put down the infamous CryptoLocker ransomware.
Docker has acquired London-based Orchard Laboratories as the much-hyped startup sets its sights on the enterprise market with improved orchestration of complex applications. The company says it has an 'aggressive roadmap' for future growth.
IBM's heavy investment in SoftLayer over the first 12 months got the attention of many IT shops. But some say IBM needs to deliver more before they can commit.
Applications are getting complicated and finding the best tools is tough. Cloud orchestration and DevOps can help, but they aren't quite the same thing.
Cloud service outages can put a damper on business capabilities, services and wallets. Learn how to minimize the risks of outages.
AWS CloudTrail is a Web service that keeps track of AWS API calls in your account and stores logs from multiple accounts and multiple regions in the same S3 bucket. Learn to turn on AWS CloudTrail and to find and read log files.
AWS storage services include Simple Storage Service, Elastic Block Storage, Glacier storage and DynamoDB. Here is a breakdown of each service's characteristics and what it provides based on application requirements.
In this Agile 2014 session preview, a senior software consultant explains how cloud app development can benefit from Agile methodologies.
Developers need only follow these five steps to mitigate the risks of SaaS application development.
To create a successful cloud integration strategy, architects first need to get serious about workflow analysis.
Both VMware NSX and Hyper-V network virtualization offer compelling features, but this breakdown should help you figure out the best fit for you.
VMware isn't the right fit for everyone, so what's the next step? There are options, like cloud, if you want to move away from VMware.
In this podcast, we talk with Christian Mohn about the VMware Marvin speculation and what we're expecting to see at VMworld 2014.
What is an OVA file and how does it compare to an Open Virtualization Format package?
Using vApps adds powerful features to an administrator's arsenal, such as determining a VM startup and shutdown order.
Vendors can reduce potential issues by packaging VMs into a virtual appliance for customers. Here's how to create and modify the resulting OVF file.
Consumers are spending more money shopping online, with clothing and footwear seeing the biggest increases
British luxury casualwear brand Crew Clothing chose cloud marketing to move from batch email marketing to a more timely and personal approach
In this memo to President Obama, dated January 2013, former employees of the US electronic intelligence agency explain how NSA leaders allegedly failed in their intelligence collection and analysis before 9/11, covered up the mistakes, violated the US constitution, wasted billions of dollars on technology and mislead the public. This report was compiled by 4 former senior NSA employees: - William Binney, former Technical Director, World Geopolitical & Military Analysis; Co-founder of the SIGINT Automation Research Center - Thomas Drake, former Defense Intelligence Senior Executive Service, NSA - Edward Loomis, former Chief, SIGINT Automation Research Center, NSA - J. Kirk Wiebe, former Senior Analyst, SIGINT Automation Research Center, NSA